Overview of Cyber Attacks Classification and Detection in IoT Using CNN-Deep Reinforcement Learning
Overview of Cyber Attacks Classification and Detection in IoT Using CNN-Deep Reinforcement Learning
Overview of Cyber Attacks Classification and Detection in IoT Using CNN-Deep Reinforcement Learning
Abstract:- Millions of digital devices total the Internet of II. CLASSIFICATION OF CYER
Things (IoT), and this allows very easy interaction from ATTACKS IN IOT
users connecting the devices. IoT is one of the tech
sectors that is expanding most rapidly, but it can also be A. Physical Attacks
very vulnerable to hazards. Infections and abnormal IoT device hardware be the target of physical attacks.
placement on the Internet of Things (IoT) framework is Attackers may trigger malfunctions or criminal data access
an increasing threat in the field of technology. In view of via tampering devices, messing with sensors, or having
the growing IoT foundation usage across all industries, unauthorized physical access to the devices.
attacks and dangers on these systems have also grown
proportional. Leveraging typical machine learning Zero-Day Attacks
methods, cyber-attack detection plays a critical role in This attack subtype relies on an undetected flaw in IoT
avoiding damage from cyberattacks on IoT devices. IoT devices or software. These vulnerabilities can be highly
Cyber Attacks are Not Detected by ANN Artificial effective and tough to guard against because attackers make
Neural Networks Using Deep Learning Techniques use of them before developers have a chance to issue
CNN-DRL (Convolutional Neural Networks-Deep patches.
Reinforcement Learning) Hybrid Approach: Detects
Attacks, including Distributed Denial of Service (DDoS), Eavesdropping Attacks
Zero-day, and Eavesdropping Attacks. Attackers maintain a watch on the way IoT devices
and communication channels interact with others, with the
Keywords:- Cyber Attacks, Internet of Things (IoT), goal of stealing user credentials or sensitive data. To counter
Convolutional Neural Networks, Deep Reinforcement this threat, secure communication protocols and proper
Learning. encryption are required.
H. Side-Channel Attacks
Attackers using side channel take employ of data that
is exposed if the device is working regularly, such as
patterns of power use or electromagnetic emissions. IoT
attacks like these have the capacity for exposing encryption
keys and other personal information.
I. Encryption Attacks
If the user's IoT device is not encrypted, then attackers
can install and modify their algorithms and take over your
device. In regard to the significance of encryption in IoT
devices, this is a crucial detail to remember.
IV. PROPOSED METHDOLOGY interesting elements from IoT network traffic data by
utilizing CNN's features. In order to identify the most useful
CNN, our suggested method for feature selection and characteristics to correctly classify network traffic as either
threat detection on Internet of Issues networks. CNN utilizes attack or regular, CNN-CNN consists of two separate CNN
the features of a dual convolutional neural network models that cooperate in some way. One model is used for
architecture. Our approach is to automatically choose feature selection, and the other is used for attack detection.
Convolutional neural networks are distinguished from DRE deep reinforcement learning Within the field of
other neural networks by their superior performance with machine learning, a new research area is called While neural
image, speech, or audio signal inputs. They have three main networks have made recent advances in fields such as time
types of layers, which are: series, computer vision, and machine translationNeural
network deep learning. Many of DRL achievements can be
Convolutional layer attributed to extending earlier RL work to high-dimensional
Pooling layer situations. This is brought about by neural networks' strong
Fully-connected (FC) layer function approximation capabilities and their ability to learn
low-dimensional feature representations. Unlike tabular and learning (RL) agents, enabling them to learn directly from
typical nonparametric approaches, DRL may successfully high-dimensional, raw visual inputs. Training deep neural
conquer the curse of dimensionality through representation networks to approximate the optimal policy π* and/or the
learning [7]. Convolutional neural networks (CNNs), for optimal value functions V*, Q*, and A* is the broad
example, can be employed as parts of reinforcement foundation for deep learning via reinforcement (DRL).
Data Preprocessing To get ready for machine learning, data is collected from
The process of changing raw data into a format that is many sources and scrubbed. It might not be in a suitable
suitable to machine learning is known as data preparation. form, have sounds and missing data, or both.
V. RESULTS
df= pd.read_csv(r'C:\Users\qures\Downloads\sample.csv')
print(df)
The Internet of Things (IoT) is a system made up of I would like to express my profound gratitude to Dr.
millions of digital devices and people can easily interact Kunjam Nageswara Rao Professor Department of Computer
with the devices by connecting them. One of the digital Science and System Engineering in Andhra University
sectors that is expanding the fastest is IoT, but it may also Andhra Pradesh, Visakhapatnam India, for giving Guidance
be very hazardous. A increasing hazard in the sphere of and Support to Review and Given suggestion.
technology is the Internet of Things (IoT) buildings that can
be damaged by infections and faulty duty. Growing Author Contribution
adoption of internet of things in various industries has led to All authors contributed to the study conception and
a proportional rise in attacks and dangers on these systems. design. Material preparation, data collection and analysis
Cyber-attack detection, which makes utilization of basic were performed by Katikam Mahesh, Dr Kunjam
machine learning methods, is critical for avoidance of Nageswara Rao, and all authors commented on previous
damage from cyberattacks on Iot of Things devices. I.T. versions of the manuscript.
Artificial Neural Networks (also called ANN Do Not Detect
Cyberattacks Using Deep Learning The techniques Conflicts of Interest
Convolutional neural networks-deep reinforcement learning The authors declare no conflicts of interest
(CNN-DRL) hybrid approach: Detect attacks, such as
eavesdropping, zero-day, and distributed denial of service
(DDoS) attacks.In future Classifly more Attcks Using
Advanced Deeop Learnig Technques.